{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:55Z","timestamp":1772196475948,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1109\/tmc.2006.83","type":"journal-article","created":{"date-parts":[[2006,4,28]],"date-time":"2006-04-28T10:45:02Z","timestamp":1146221102000},"page":"695-710","source":"Crossref","is-referenced-by-count":109,"title":["Performance comparison of trust-based reactive routing protocols"],"prefix":"10.1109","volume":"5","author":[{"given":"A.A.","family":"Pirzada","sequence":"first","affiliation":[]},{"given":"C.","family":"Mcdonald","sequence":"additional","affiliation":[]},{"given":"A.","family":"Datta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2501"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"ref4","first-page":"78","article-title":"A Secure Routing Protocol for Ad Hoc Networks","volume-title":"Proc. Int\u2019l Conf. Network Protocols (ICNP)","author":"Dahill"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-22792-x_4"},{"key":"ref6","first-page":"47","article-title":"Establishing Trust in Pure Ad Hoc Networks","volume-title":"Proc. 27th Australasian Computer Science Conf. (ACSC)","volume":"26","author":"Pirzada"},{"key":"ref7","first-page":"41","article-title":"Kerberos Assisted Authentication in Mobile Ad Hoc Networks","volume-title":"Proc. 27th Australasian Computer Science Conf. (ACSC)","volume":"26","author":"Pirzada"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/283751.283772"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWWAN.2004.1525541"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2004.1409162"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref12","article-title":"The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)","volume-title":"IETF MANET","author":"Johnson","year":"2003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_24"},{"key":"ref15","volume-title":"PGP: Pretty Good Privacy","author":"Garfinkel","year":"1995"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"ref18","first-page":"579","article-title":"Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks","volume-title":"Proc. ACM\/Kluwer Mobile Networks and Applications (MONET)","volume":"8","author":"Buttyan"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904822"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2001.992756"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.1999.805497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345952"},{"key":"ref24","article-title":"Temporally Ordered Routing Algorithm (TORA) Version 1 Functional Specification","volume-title":"IETF MANET","author":"Park","year":"2001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094876"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF01196259"},{"key":"ref27","article-title":"Internet MANET Encapsulation Protocol (IMEP) specification","volume-title":"IETF MANET","author":"Corson","year":"1999"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"ref29","article-title":"Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms","volume-title":"Advances in Ad Hoc and Sensor Networks","author":"Pirzada","year":"2006"},{"key":"ref30","first-page":"83","article-title":"A Note on Two Problems in Connection with Graphs","author":"Dijkstra","year":"1959","journal-title":"Numerische Mathematik"},{"key":"ref31","article-title":"The Network Simulator","year":"1989"},{"key":"ref32","article-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications 802.11","year":"1997"},{"key":"ref33","volume-title":"Computer Networks","author":"Tanenbaum","year":"2002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1180496"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011474616255"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2000.896308"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/7755\/34098\/01624341.pdf?arnumber=1624341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:58:22Z","timestamp":1741841902000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/1624341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":36,"journal-issue":{"issue":"6"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/tmc.2006.83","relation":{},"ISSN":["1536-1233"],"issn-type":[{"value":"1536-1233","type":"print"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}